Naval Postgraduate School
Calendar | Directory
banner
Computer Science Department Faculty

See openings for faculty positions.

 

Faculty MemberTitleDegree InfoResearch
Auguston, MikhailAssociate ProfessorPh.D., Glushkov Cybernetics Institute, 1983Software Engineering, Programming Languages, Compiler Construction, Testing and Debugging Automation, Visual Programming, Computer Security
Berzins, ValdisProfessorPh.D., Massachusetts Institute of Technology, 1979Software Engineering, Computer Aided Design, Software Evolution and Merging, Specification Languages, Computer Languages, Program Synthesis and Verification, Knowledge Representation, Engineering Databases
Beverly, RobertAssistant ProfessorPh.D., Massachusetts Institute of Technology, 2008Network architecture, systems engineering, Internet measurement, and complex systems. Intersection of networks and machine learning.
Burke, KarenResearch Associate ProfessorMS, Southern Illinois University, 1979Information Assurance, Government policy
Clark, PaulResearch AssociateMS, Naval Postgraduate School, 1999Computer Security Education, Modification of Open Source Operating Systems
Coté, ScottSenior LecturerMS, Naval Postgraduate School, 2000Network design and integration, wireless networking, network security and robotics.
Darken, ChrisAssociate ProfessorPh.D., Yale University, 1993Artificial intelligence, machine learning, and human cognition and behavior models for simulations
Darken, RudyProfessor
DSc, George Washington University, 1995Virtual environments, Human-computer interaction, Human factors, Training systems, Wireless mobile computing
Das, ArijitResearch AssociateMS, University of Nevada, 1989Mobile Devices, Pocket PC, PALM, embedded C, J2ME, Java
Davis, DuaneResearch Assistant ProfessorPh.D., Naval Postgraduate School, 2006Robotic and unmanned systems, machine learning, and cyber physical systems
Denning, Peter J.Chair, Department of Computer Sciences, Director of the Cebrowski Institute and ProfessorPh.D., Massachusetts Institute of Technology, 1968Technology and transformation, Networking in network centric operations
Dinolt, George W.Professor of PracticePh.D., University of Wisconsin-Madison, 1971Formal Methods, Computer Security
Drusinsky, DoronAssociate ProfessorPh.D., Weizmann Institute of Science, Rehovot, Israel, 1988Harel statecharts, UML, Verification, Formal Methods, Software Testing, Run time Verification, Temporal Pattern Matching, Automatic Test Generation, Real Time Model Checking, Real Time, Low Impact, On-line business rule and security checking, Temporal Logic, Metric Temporal Logic, Probabilistic Temporal Logic, Extended Regular Expressions, Visualization, Programming Applications of Formal Methods, Knowledge models, Temporal Intrusion Pattern Detection
Eagle, ChrisSenior Lecturer and Associate ChairMS, Naval Postgraduate School, 1995Computer Network Attack/Defense/Exploitation, Computer Forensics, Reverse Engineering.
Fulp, John D. (JD)Senior LecturerMS, Naval Postgraduate School, 1996Implementation of Public Key Infrastructure, Design of Secure Networks
Garfinkel, Simson L.Associate ProfessorPh.D., Massachusetts Institute of TechnologyComputer forensics, the emerging field of usability & security, privacy technology, information policy, and personal information management
Gibson, John H.Research AssociateMS, Naval Postgraduate School, 1990 and 2000Computer networks (especially under extremely harsh environments, such as shallow water acoustic communications or mobile, low-power, ad hoc networks in support of battlefield operations)
Huffmire, TedAssistant ProfessorPh.D., UC Santa Barbara, 2007Computer Architecture, Computer Security
Irvine, Cynthia E.Professor and Director of the Center for Information Systems Security Studies and Research (CISR).Ph.D., Case Western University, 1975Information Assurance, Multilevel Security, High Assurance Security Engineering, Network Security, Security Models, Distributed Systems Security, Security Requirements Engineering, Information Assurance Pedagogy, Systems Architecture
Kölsch, Mathias N.Associate Professor and Chair of the Computer Science Curriculum CommitteePh.D., University of California, Santa Barbara, 2004Computer Vision; Virtual & Augmented Reality, Video Analytics, Artificial Intelligence
Lewis, TedProfessorPh.D., Washington State University, 19711. Legacy system migration in enterprise systems; XML and N-tier architectures as an architectural framework for systems migration and “aging”; 2. Agent-based simulation systems: the application of scale-free network theory to critical infrastructure protection; optimization of networks; network-centric warfare; spread of epidemics; 3. Internet business modes and the theory of increasing returns: application of technology diffusion equations in business modeling; mathematical models of chaos (non-linear systems) to marketing.
Lundy, G.M.Associate ProfessorPh.D., Georgia Institute of Technology, 1988Computer networks, Telecommunications networks, Internetworking, Network security, Formal specification, Analysis, Testing and simulation of computer network protocols, High speed networks, Application of networks
LuqiProfessorPh.D., University of Minnesota, 1986Cyber and Cyber-Physical Systems, Social Context Modeling for Cyber, Big and Intensive Data Processing, Real-Time Monitoring for Network Based Systems, Detection Software for Insider Threat, Cyber-Physical Systems Security and Safety, Model Based System and Software Risk Analysis, Documentation Process Automation, Unified Hardware/Software Architecture, Metrics, Testing and Problem Solving in Rapid Prototyping
Martell, CraigAssociate  Professor and Associate ChairPh.D., University of Pennsylvania, 2004Machine Learning, Natural Language Processing
McGhee, Robert B.Professor EmeritusPh.D., University of Southern California, 1963Military Robotics, Computer Architecture, Computer Graphics
McMullen, EricLCDR, USN, Program Officer, Military FacultyMS, Naval Postgraduate School, 2013Human Factors in Simulation, Supervisory Control of UAVs
Michael, BretProfessorPh.D., George Mason University, 1993Trustworthy and dependable distributed systems, cloud and mobile device computing.
Nguyen, Thuy D.Research AssociateBA, University of California –San Diego, 1982Advanced Topics in Computer Security, Trusted Operating Systems and Kernels, Multilevel Security Applications, Common Criteria Evaluation for High Robustness Systems, Secure Web Services
Otani, Thomas W.Associate ProfessorPh.D., University of California, San Diego, 1983Object-Oriented Modeling, Visual Query Languages, Software Development for Mobile Devices, Computer Science Education
Peitso, LorenSenior Lecturer and Associate Chair for AdministrationMS, Naval Postgraduate School, 2002Artificial Intelligence and learning methods, physically based simulation for uses in virtual environments, training and robotics
Prince, CharlesResearch AssociateBS, Oregon State University 1987, 1994, 1994Mobile Devices, Network, Security, Embedded Devices
Rohrer, JustinResearch AssociatePh.D., The University of Kansas, 2011Mobile wireless networks, disruption-tolerant networks (DTNs), software-defined networks, network resilience and survivability
Rowe, Neil C.ProfessorPh.D., Stanford University, 1983.Applied Artificial Intelligence
Shaffer, AlanCDR, USN, Assistant Professor and Associate Chair for AcademicsPh.D., Naval Postgraduate School, 2008Information Assurance, High Assurance System Engineering, Secure systems development and verification
Shifflett, DavidResearch AssociateBS, California State University, Northridge, 1985Multi-Level Security, High Assurance Computing/Systems, Trusted Networking
Shing, Man-TakAssociate ProfessorPh.D., University of California at San Diego, 1981Software Engineering, Real-Time Systems Modeling and Scheduling, Software Architectures for embedded and distributed systems, Computer-Aided Prototyping, Software Re-engineering, Engineering Automation for Computer Based System
Singh, GurminderProfessor and Director of the Center for the Study of Mobile Devices and Communications (2002)Ph.D., University of Alberta, Canada, 1989Wireless Mobile Computing, Mobile Devices, Wireless Data Services
Sullivan, JoeCDR, U.S. Navy, Military Instructor and Interim Director, Modeling, Virtual Environments and Simulation InstituteMS, Naval Postgraduate School, 1998Military training applications for virtual environments
Thompson, MikeResearch AssociateBS, Marquette University, 1981Network security simulation based educational games, high assurance multilevel security, software vulnerability analysis tools
Volpano, Dennis M.Associate ProfessorPh.D., Oregon Graduate Institute, 1986Programming Languages, Type Systems, Program Security
Xie, GeoffreyProfessor and Associate ChairPh.D., University of Texas at Austin, 1996Network design, configuration, analysis, and validation; Tactical and disruption tolerant networks; Secure handhelds and seamless mobility; Underwater acoustic networks
Young, JoelAssistant Professor, Associate Chair for ResearchPh.D., Brown University, 2004Machine Learning

This is an official U.S. Navy website.
All information contained herein has been approved for release by the NPS Public Affairs Officer.
Page Last Updated: Jul 23, 2014 6:12:12 AM | Contact the Webmaster